• PFSense as cilent for Cisco IPsec VPN server

    3
    0 Votes
    3 Posts
    1k Views
    A
    Derelict, thank you for replying to my post! The reason I want to have pfSense connect to the VPN server is that I want to be able to connect my mobile devices to my WiFi network and have access to the remote site through the VPN tunnel. As a workaround, I can use a Mac to connect to the VPN and create a hotspot (I thins to be more reliable on a Mac than on Windows), but I consider this option as the last option. Another solution is to buy another AccessPoint that offers Cisco IPSec with authentication, but my searches on the internet have not been very productive. If any of you know of an example, please let me know. (I have a Tomato AP, but that doesn't support IPSec out of the box) Thanks, Alex
  • 0 Votes
    3 Posts
    1k Views
    K
    Also you should be able to restore changes from the backup/Restore???
  • Nrpe check_ping and Ipsec

    3
    0 Votes
    3 Posts
    2k Views
    P
    Thank you very much jimp. I chose the first option and its working well, just as I wanted. Wasn't so hard after all. I had to add the "-4" flag in the nrpe check too. One problem less :)
  • DMVPN and OSPF

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • IPsec site to site and multiple networks

    2
    0 Votes
    2 Posts
    1k Views
    jimpJ
    It's necessary in most every IPsec device but the methods are different. Some define the Phase 2 networks as we do. Ethers define them using ACLs, policies, or "routes" of sorts – no matter what you need to have a list of networks to allow on your side and IPsec destinations on the far side. Some try to automate or hide parts of it, but it makes diagnosing tunnel issues much more difficult than it needs to be. In the future it may be simplified somewhat by using aliases for Phase 2 networks, but that isn't possible yet.
  • Does wildcard ssl required dedicated IPs for each sub-domains

    1
    0 Votes
    1 Posts
    686 Views
    No one has replied
  • Will switch to strongswan allow for High Availability?

    6
    0 Votes
    6 Posts
    2k Views
    C
    @kapara: Yeah not sure either.  I guess the best way to find out is I will post a bounty.  I am sure others will also be interested in a true IPSec failover solution. Or ask in the strongswan / freebsd communities.
  • PfSense Racoon as VPN client

    2
    0 Votes
    2 Posts
    657 Views
    jimpJ
    No.
  • IPsec to Azure

    1
    0 Votes
    1 Posts
    922 Views
    No one has replied
  • Ipsec die when no client is in the network

    5
    0 Votes
    5 Posts
    1k Views
    P
    @l123456: So what shoould i ping in this case ? I usually ping the LAN interface address of the remote box. Why I couldn't ping from server to server ? I'd think it is because something in your configuration prevents it.
  • Endpoints different configurations

    2
    0 Votes
    2 Posts
    902 Views
    U
    Mostly, in my experience, IPsec connections need to match exactly on both endpoints. Problems arise when connecting pfSense to hardware like Cisco and Sonicwall (for which there are many good tutorials online). I have done both successfully, but it is always a challenge making pfSense terminology match-up to vendor terminology. -J
  • Mystified by iperf results across IPsec tunnel

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • VPN Ipsec : random disconnections

    3
    0 Votes
    3 Posts
    1k Views
    A
    I changed the timeout of the VPN both sides and it works better.  It happens less times but still problems sometimes.  I need to disconnect it from remote side, then VPN is automatically up. Really strange…
  • Reboot required when IPSEC drops

    4
    0 Votes
    4 Posts
    1k Views
    C
    You running PPTP on there? That's the log you end up with in the misconfiguration described here. https://redmine.pfsense.org/issues/1421 Jim's suggestion is the other likely possibility. When it's happening, check Diag>States, filter for ESP, :500 and :4500. What do those look like?
  • Local Network WAN

    1
    0 Votes
    1 Posts
    589 Views
    No one has replied
  • Reconnect after failure

    3
    0 Votes
    3 Posts
    1k Views
    M
    Anyway to tell pfsense to just reconnect if a failure happens?
  • Direct traffic through IPSEC tunnel

    3
    0 Votes
    3 Posts
    2k Views
    A
    @breakaway: Hello, I have 192.168.254.0/24 at Site A, and 192.168.253.0/24 at Site B. Site A pfSense has 3 interfaces. WAN – Static IP from my ISP LAN -- 10.0.0.0/24 OPT1 -- 192.168.254.0/24 Site B pfSense has 4 interfaces WAN -- static IP from my ISP WAN2 -- static IP from my ISP LAN -- internal stuff (not relevant to this) OPT1 -- 192.168.253.0/24 I've got a tunnel up between OPT1 (Site A) <-> OPT1 (Site B) I am wanting all traffic that goes into OPT1 at Site A to be directed through the IPSEC tunnel to OPT1 at Site B. Site B contains NAT rules to allow 192.168.253.0/24 to access the internet. What sort of settings do I need on the tunnel @ Site A pfSense to make this happen? PS, I've found a guide on how to send ALL traffic through the IPSEC tunnel but this is not what I want – I just want traffic out of OPT1 to go through the IPSEC tunnel. [image: 8quUL.jpg] Out of curiosity, have you tried setting up an additional phase 2 entry on the tunnel config at Site A to Site B for Source=OPT1 Net, Dest=Net 0.0.0.0/0? In theory this would tell all the traffic at Site A that is not local to route through the tunnel. On the other end, you likely don't even need a complementary Phase 2 entry. If you do this, keep in mind that you may need a firewall rule for IPSec traffic at Site B to allow this traffic in order for it to work.
  • Mobile IPSec VPN Statuses

    1
    0 Votes
    1 Posts
    721 Views
    No one has replied
  • Hint: IPSEC for IPv6

    1
    0 Votes
    1 Posts
    848 Views
    No one has replied
  • Azure Ipsec tunnels ERROR: failed to get sainfo.

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.